Specific Similarity Measure for Terrorist Networks: How Much Similar Are Terrorist Networks of Turkey?
Some countries suffer from terrorism much more than others, Turkey as one of the most suffering countries who owns about a hundred terrorist groups; most of these organizations cooperate, and interchange knowledge, skills, materials used for terrorist attacks. From criminological perspective terrorist networks of Turkey are categorized into three main groups: extreme left (i.e. Marxist) networks, extreme right (i.e. Fundamentalist, Radical Islamist) networks, and separatist (i.e. ethic, racist) networks. By using their criminal history including the selection of crimes, attacking methods and modus operandi, a crime ontology is created, terrorist networks are attached to this ontology via their attacks and a similarity measure (COSM) is developed according to this ontology. Results of this similarity measure performed better than two common similarity measures; cosine and Jaccard. Results are also presented to domain experts in hierarchical clustering and they also commented as positive. Based on attributes of crimes, COSM similarity can also be applied to other types of social networks.
KeywordsTerrorist networks similarity crime ontology cosine Jaccard
Unable to display preview. Download preview PDF.
- 1.Asaro, C., Biasiotti, M.A., Guidotti, P., Papini, Sagri, M., Tiscornia, D.: A Domain Ontology: Italian Crime Ontology. In: ICAIL 2003 Workshop on Legal Ontologies & Web Based Legal Information Management (2003)Google Scholar
- 2.Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 2nd edn. (2001)Google Scholar
- 3.Dzemydeiene, D., Kazemikaitiene, E.: Ontology-based decision supporting system for crime investigation processes. Information Systems Development: Advances in Theory, Practice and Education, 427–438 (2005)Google Scholar
- 5.LaFree, G., Dugan, L.: Global Terrorism Database 1.1 and II, 1970-1997, and 1998-2004 ICPSR22541-v1, ICPSR22600- v2. Inter University Consortium for Political and Social Research, Ann Arbor (2008)Google Scholar
- 6.Lazarevich, A.: Use of ontologies and probabilistic relational models to aid in cyber crime investigation decision support. George Mason University, Washington D.C., US, Ph.D. thesis (2005)Google Scholar
- 7.Macrimeanalysts, Massachusetts Association of Crime Analysts Home Page (2010), http://www.macrimeanalysts.com/articles/classification.pdf (accessed at February 12, 2010)
- 8.Marcus, S.M., Moy, M., Coffman, T.: Social Network Analysis in Mining Graph Data, Cook, D.J., Holder, L.B. (eds.). John Wiley &Sons, Inc., Chichester (2007)Google Scholar
- 9.Skillicorn, D.: Knowledge Discovery for Counterterrorism and Law Enforcement. CRC Press, Boca Raton (2009)Google Scholar
- 11.Protégé, Standford University (2010), http://protege.stanford.edu/overview/ (accessed at February 12, 2010)